DocumentCode
2192241
Title
An Efficient and Secure Key Establishment Scheme for Wireless Sensor Network
Author
Wang, Eric Ke ; Ye, Yunming
Author_Institution
Dept. of Comput. Sci., Harbin Inst. of Technol., Harbin, China
fYear
2010
fDate
2-4 April 2010
Firstpage
511
Lastpage
516
Abstract
Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the serious limitations in terms of computational power, energy supply, network bandwidth and defection of centra authority. In order to balance the security and efficiency, we propose a new scheme by employing LU Composition techniques for mutual-authenticated pairwise key establishment and integrating LU Matrix with Elliptic Curve Diffie-Hellman for anonymous path-key establishment. At the meantime, it can achieve efficient group key agreement and management by tree-based extension of LU Matrix Composition key exchange protocol(TGLU). Theoretical analysis shows that the new scheme has better performance and provides authenticity and anonymity for sensor to establish multiple kinds of keys, compared with previous related works.
Keywords
authorisation; cryptographic protocols; public key cryptography; telecommunication security; wireless sensor networks; LU matrix composition key exchange protocol; anonymous path-key establishment; elliptic curve Diffie-Hellman; group key agreement; integrating LU matrix; key distribution center; key management; mutual authentication; pairwise key establishment; public key cryptography; secure key establishment scheme; tree-based extension; wireless sensor network; Bandwidth; Computer network management; Computer networks; Distributed computing; Elliptic curves; Energy management; Performance analysis; Power supplies; Public key cryptography; Wireless sensor networks; Key establishment; Key management; LU matrix composition; Wireless sensor networks;
fLanguage
English
Publisher
ieee
Conference_Titel
Intelligent Information Technology and Security Informatics (IITSI), 2010 Third International Symposium on
Conference_Location
Jinggangshan
Print_ISBN
978-1-4244-6730-3
Electronic_ISBN
978-1-4244-6743-3
Type
conf
DOI
10.1109/IITSI.2010.139
Filename
5453604
Link To Document